SEARCH RESULTS

YOU WERE LOOKING FOR :Technology

Essays 961 - 990

Organizational Efficiency and the Integration of Information Technology Solutions

it that has highlighted existing inadequacies all throughout the company structure. By examining each of these deficient areas in ...

Management of Technology

recognize is that technology management is an enterprise-wide concern, and that an effective approach to facilitating superior ado...

Ethics and Technology

software to weed out spam, and rules to assure that company employees are not engaging in unsavory practices, but many firms are u...

The Importance of Technology for the Fedex Corporation

quickly, there are always new ideas on the horizon. It is not as if Fedex is just waiting for something new to arise from the hea...

Information Systems Technology Projects Fail

all projects falls between 66 percent and 90 percent depending on which survey data one relies on. Engle (2007) reported that 90 ...

TECHNOLOGY CHANGE AND UNDERLYING FACTORS

be involved as end-users, this will need to be taken into account in terms of training, as well as the amount of resources dedicat...

Using Technology To Support Learning

The research would involve students in science, math, visual arts and language arts. Small groups would also be working together t...

Technology and the Criminal Justice System

and foremost, its reliability for identification purposes (Technology and Human Values, 1997). In addition, it is widely used and...

Revolutions in Science and Technology

While it is true that Fleming noted the effect of this substance on bacterial growth, the discovery entirely by chance, as Fleming...

Child Tracking Technology: Protecting Those With Cognitive Disorders

with some type of cognitive deficit disorder such as dementia or Alzheimers. In order to anticipate the percentage of those who w...

TECHNOLOGY AND ISOLATION: TRUTH OR NOT?

technology is putting people in touch with strangers on the other side of the world, its also taking away "face time" from family ...

The Non-Neutrality of Technology

comes to dealing with the junk mail, both snail mail and email, that comes pouring into our homes, it is something else when the i...

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

Uses of Technologies in the 2008 Presidential Campaigns of Barack Obama and John McCain

encourage the sharing of videos on YouTube and Brightcove (Yadav). Early in his campaign, Barack Obama acknowledged the importanc...

Ethics In Information Technology

16). Monitoring and surveillance have come to represent just two of the villainous components of computer use in the late twentie...

LOCALLY FUNDED TECHNOLOGY - REX, GEORGIA

developed. The problem is, most districts must rely on grants, bond issues and philanthropy when it comes to supporting technology...

Personnel and The Use of New Technology

changes in regard to personnel and how they react and communicate (Painter, 2008). To see how personnel were actually affected, su...

Ports; the Impact of Changing Ship Technology

of many countries. However with the emergence of the mega ships the way this takes place will not be the same. Today there are shi...

Sociological Theory, Contemporary Culture, and Technology

the need to separate religion from science, to synthesize the basic principles of the various branches of the sciences into one in...

IBM Systems and Technology Marketing

had to recover from losses that the firm may be argued as becoming one that was more marketing oriented. The firm certainly undert...

Use of Information Technologies in University Libraries

automation is also responsible for the creation and maintenance of digital technologies, which now make it possible to generate in...

Learning Theories And Technology

conferencing, and interactive video and audio technologies. These are all student-centered technologies that can build upon prior ...

Technology and Decision-Making in Nursing

showing substantial improvement over these early versions. Recognizing that the task of designing a CDSS is formidable, the Deci...

Cell Phone Technology

to represent the "geographical area covered by cellular radio antennas" (Farley and van der Hoek, 2006). Such an area is called a ...

INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points ...

Technology and Changes in American Culture

were large multi-branched entities and several generations typically lived under one roof. This was, in fact, a necessity in thes...

Information Technology Security, Web Services and Database Management Systems

many forms cryptography complexity increasing the difficulty breaking the code is achieved with the use of prime numbers. One most...

Information Technology and Competitive Advantage

is possible to access at all today. In order to assess the management of technology the way competitive advantages are gained it...

Adoption of Technology in Classrooms

so frequently that it is simply accepted as a maxim. However, data from the third annual "Teachers Talk Tech" survey, which was ta...

Considering the Implementation of an Information Technology Strategy for Local Government

the research to develop which takes all of the potential factors into account; dependant and interdependent influences as well as...